Policies vs Standards vs Controls vs Procedures

When it comes to cybersecurity compliance, words have specific meanings and it is important to get those terms correct. Improper terminology usage has cascading effects that can negatively impact the internal controls of an organization. 

Cybersecurity, technology, privacy and legal professionals routinely abuse the terms “policy” and “standard” as if these words are synonymous, when they are not and have very distinct differences! ComplianceForge compiled the information on this page to help cybersecurity and data privacy practitioners get in alignment with authoritative definitions, since documentation terminology is important - they have specific meanings and that directly pertains to cybersecurity and data protection compliance efforts. 

Documentation needs to usable, where it cannot just exist in isolation (e.g., shelfware that is only pulled out for an audit). This means cybersecurity and data protection documentation needs to be written clearly, concisely and in a business-context language that users can understand. By doing so, users will be able to find the information they are looking for and that will hopefully lead to cybersecurity and data protection requirements being implemented throughout your organization.

Additionally, having clearly-written and concise documentation can be “half the battle” when preparing for an audit/assessment, since documentation is often the first impression an assessment team has. Not only does that put your organization in a positive light with the assessment team, clearly-written and concise documentation can decrease audit/assessment related expenses due to minimizing back-and-forth communications to find specific policies, standards or procedures. Time is money and inefficient documentation is an unnecssary expense.

Guide to understanding policies vs standards vs procedures vs controls vs metrics

Click here for a free guide 

What Are Authoritative Sources For Cybersecurity Documentation Definitions? 

ComplianceForge leverages a few key authoritative sources for cybersecurity documentation definitions:

What Is The Difference Between A Cybersecurity Policy A Standard? 

While policies and standards are both governance documents, each serves a unique role. In simple terms, a policy is a high-level statement of management intent that formally establishes requirements to guide decisions and achieve rational outcomes. A policy is intended to come from the CEO or board of directors that has strategic implications. However, a standard is a formally-established requirement in regard to a process, action or configuration that is meant to be an objective, quantifiable expectation to be met (e.g., 12 character password, change passwords every 90 days, etc.).

In reality, no one should ever ask for an exception to a policy. Exceptions should only be for standards when there is a legitimate business reason or technical limitation that precludes a standard from being followed (e.g., vulnerability scanning exception for a "fragile" application that breaks when scanned by the default scanning profile). It is important that if a standard is granted an exception, there should be a compensating control placed to reduce that increased risk from the lack of the required standard (e.g., segment off the application that cannot be scanned for vulnerabilities).

If you visualize these concepts, you can see the hierarchical nature of these documentation components, where policies are the foundation that everything builds upon:

hierarchical cybersecurity governance framework

All too often, documentation is not scoped properly, and this leads to the governance function being more of an obstacle as compared to an asset. A multiple-page “policy” document that blends high-level security concepts (e.g., policies), configuration requirements (e.g., standards), and work assignments (e.g., procedures) is an example of poor governance documentation that leads to confusion and inefficiencies across technology, cybersecurity, and privacy operations. Several reasons why this form of documentation is considered poorly-architected documentation include:

Is A Policy A Control?

Yes. Technically, a policy is a control since a policy is merely an “administrative safeguard” and that meets the criteria of a control. A control is a “means of managing risk, including policies, procedures, guidelines, practices or organizational structures, which can be of an administrative, technical, management, or legal nature.”

For Cybesecurity Documentation, What Do Right Looks Like?

In the context of good cybersecurity documentation, components are hierarchical and build on each other to build a strong governance structure that utilizes an integrated approach to managing requirements. Well-designed documentation is generally comprised of six (6) main parts:

  1. Policies establish management’s intent;
  2. Control Objectives identify leading practices (mapped to requirements from laws, regulations and frameworks);
  3. Standards provide quantifiable requirements;
  4. Controls identify desired conditions that are expected to be met (requirements from laws, regulations and frameworks);
  5. Procedures / Control Activities establish how tasks are performed to meet the requirements established in standards and to meet controls; and
  6. Guidelines are recommended, but not mandatory.

policy vs standard vs control vs procedure

What Are Common Cybersecurity & Data Protection Documentation Components?

Words have specific meanings, so it is important to provide examples from industry-recognized sources for the proper use of these terms that make up cybersecurity & privacy documentation:

What Is A Cybersecurity Policy?

Policies are high-level statements of management intent from an organization’s executive leadership that are designed to influence decisions and guide the organization to achieve the desired outcomes:

Unfortunately, for many IT/cybersecurity professionals, when they refer to a “policy” they really mean “standard.” This common misuse of critical documentation components can create a significant amount of confusion, since those are not interchangeable terms. Standards are subordinate to policies and standards address the granular requirements needed to satisfy a policy. Therefore, a 1-3 sentence policy statement is acceptable to capture a “high-level statement of management intent” for a specific domain.

Authoritative source definitions:

What Is A Cybersecurity Control Objective?

Control Objectives are targets or desired conditions to be met.

Where applicable, Control Objectives are directly linked to laws, regulations and frameworks to align cybersecurity and data privacy with reasonably-expected practices. The intent is to establish sufficient evidence of due diligence and due care to withstand scrutiny (e.g., external audits/assessments) to disprove potential accusations of negligence.

Authoritative source definitions:

What Is A Cybersecurity Standard?

Standards are mandatory requirements regarding processes, actions and/or configurations.

Authoritative source definitions:

What Is A Cybersecurity Guideline / Supplemental Guidance?

Guidelines are recommended practices that are based on industry-recognized secure practices.

Authoritative source definitions:

What Is A Cybersecurity Control?

Controls are technical, administrative or physical safeguards.

Authoritative source definitions:

What Is An Assessment Objective (AO)?

Assessment Objectives (AOs) are a set of determination statements that express the desired outcome for the assessment of a Control.

Authoritative source definitions:

What Is A Cybersecurity Procedure?

Procedures are a documented set of steps necessary to perform a specific task or process in conformance with an applicable standard.

The result of a procedure is intended to satisfy a specific control. Procedures are also commonly referred to as “control activities.”

Authoritative source definitions:

What Is A Cybersecurity Risk?

Risks represents a potential exposure to danger, harm or loss. Risk is associated with a control deficiency (e.g., If the control fails, what risk(s) is the organization exposed to?). Risk is often calculated by a formula of Threat x Vulnerability x Consequence in an attempt to quantify the potential magnitude of a risk instance occurring. While it is not possible to have a totally risk-free environment, it may be possible to manage risks by avoiding, reducing, transferring, or accepting the risks.

Authoritative source definitions:

What Is A Cybersecurity Threat?

Threats represents a person or thing likely to cause damage or danger. Natural and man-made threats affect control execution (e.g., if the threat materializes, will the control function as expected?). Threats exist in the natural world that can be localized, regional or worldwide (e.g., tornados, earthquakes, solar flares, etc.). Threats can also be manmade (e.g., hacking, riots, theft, terrorism, war, etc.).

Authoritative source definitions:

What Is A Cybersecurity Metric?

Metrics provide a “point in time” view of specific, discrete measurements. However, trending and analytics that are derived by comparing a baseline of two or more measurements taken over a period of time. Analytics are generated from the analysis of metrics.

When people refer to "metrics" it is generally a misuse of the term, since the desired result is actually analytics. Analytics are designed to facilitate decision-making, evaluate performance and improve accountability through the collection, analysis and reporting of relevant performance related data. Good metrics are those that are SMART (Specific, Measurable, Attainable, Repeatable, and Time-dependent).

Authoritative source definitions:

What Is A Secure Baseline Configuration / Hardening Standard?

Secure baseline configurations (e.g., hardening standard) are technical in nature and specify the required configuration settings for a defined technology platform. Leading guidance on secure configurations tend to come from (1) Center for Internet Security (CIS) Benchmarks, (2) Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) and/or (3) Original Equipment Manufacturer (OEM) recommendations.

Authoritative source definitions:

What Is A Risk Register / Plan of Action & Milestones (POA&M)?

A POA&M is a “living document” that summarizes control deficiencies from identification through remediation. A POA&M is essentially a risk register that tracks the assignment of remediation efforts to individuals or teams, as well as identifying the tasks and resources necessary to perform the remediation.

Authoritative source definitions:

What Is A System Security Plan (SSP) / System Security & Privacy Plan (SSPP)?

A SSP/SSPP is a “living document” that summarizes protection mechanisms for a system or project. It is a documentation method used to capture pertinent information in a condensed manner so that personnel can be quickly educated on the “who, what, when, where, how & why” concepts pertaining to the security of the system or project. A SSP/SSPP is meant to reference an organization’s existing policies, standards and procedures and is not a substitute for that documentation.

Authoritative source definitions:

How Should Cybersecurity Documentation Should Be Structured? Policy > Standard > Procedure

In an effort to help clarify this concept, ComplianceForge Hierarchical Cybersecurity Governance Framework™ (HCGF) takes a comprehensive view towards the necessary documentation components that are key to being able to demonstrate evidence of due diligence and due care. This framework addresses the interconnectivity of policies, control objectives, standards, guidelines, controls, risks, procedures & metrics. The Secure Controls Framework (SCF) fits into this model by providing the necessary cybersecurity and privacy controls an organization needs to implement to stay both secure and compliant.

In the context of good cybersecurity & privacy documentation, policies, standards and procedures are key components that are intended to be hierarchical and build on each other to build a strong governance structure that utilizes an integrated approach to managing requirements. Your cybersecurity & data protection documentation is meant to address the “who, what, when, how & why” across the strategic, operational and tactical needs of your organization:

cybersecurity supply chain risk management c-scrm nist 800-161

How Do I Assign Control Ownership For Cybersecurity Controls & Procedures? 

One of the most important things to keep in mind with procedures is that the "ownership" is different than that of policies and standards:

Given this approach to how documentation is structured, based on "ownership" of the documentation components:

cybersecurity compliance vs security

Below is an example of how documentation can be broken down from a law/regulation/framework to build documentation (e.g., policies, standards, guidelines, procedures, etc.):

External Frameworks

Frameworks are often referred to as a standard. In reality, most frameworks are merely a repository of specific controls that are organized by control families (e.g., NIST CSF, ISO 27002, NIST SP 800-171, NIST SP 800-53, etc.).

For example, while NIST SP 800-53 R5 is called a "standard" it is made up of 1,189 controls that are organized into 20 control families (e.g., Access Control (AC), Program Management (PM), etc.). These controls are what make up NIST SP 800-53 as a "framework" that an organization can use as a guide to develop its internal policies and standards that allow it to align with those expected practices.

free cybersecurity documentation example

Internal Security Documentation (Policies)

An organization is expected to identify a framework that it wants to align its cybersecurity program with, so that its practices follow reasonably-expected controls.

Ideally, there should be a policy that corresponds to each of the control families. This helps make an organization's alignment with its adopted framework more straightforward.

Control objectives provide a 1-1 mapping to address a specific control (e.g., AC-3, AC-7, etc.). For each control objective:

  • There should be a granular standard that addresses the objective of the control (hence the name "control objective").
  • The standard may or may not have guidelines that accompany the standard.
  • There should be a Standardized Operating Procedure (SOP) that describes how the standard is operationalized to meet the intent of the control.

Questions? Please contact us for clarification so that we can help you find the right solution for your cybersecurity and privacy compliance needs.

Browse Our Products

  • Secure Controls Framework (SCF) Policy, Standards, Controls & Metrics Template - DSP / SCF

    Digital Security Program (DSP)

    Secure Controls Framework (SCF)

    Secure Controls Framework (SCF) "Premium Content" - Editable Policies, Control Objectives, Standards, Guidelines, Controls & Metrics. Product Walkthrough Video When you click the image or the link below, it will direct you to a different page on...

    $10,400.00 - $15,200.00
    Choose Options